ISSA New England Virtual Threat Summit and CyberEscape Room
Attend the Fall Threat Summit with ISSA New England. Exciting presentations from Digital Shadows and Semperis. Participate in the Virtual Cyberescape room (Trailer) hosted by Living Security for a chance to win $Gift card$. Attendees will get 3 CPEs.
Date and Time – Sept. 24, 2020, 4 pm - 7 pm EST
Agenda:
4:00 – 4:45 pm Ransomware Risk and Recovery by Sean Deuby, Director of Services at Semperis
4:45 – 5:30 pm Account Takeover: Magnitude and Impact by Alec Alvarado, Cyber Threat Intelligence, Digital Shadows
5:30 – 7:00 pm CyberEscape Room with Living Security and Winning Prize!!!
Register in advance for this meeting: [registration button at bottom of this page]
Topic : Ransomware, Risk, and Recovery: Is Your DR Strategy Ready for Today’s Threats? Disaster Recovery (DR) strategies have traditionally focused on natural disasters, then expanded into other physical events such as terrorism. Today, cyber weaponization is everywhere, and the "extinction event" is a genuine threat with no respect for geographic boundaries.
In 2017 the NotPetya ransomware attack impacted Maersk worldwide in under 10 minutes and cost the company over $300M. The 2018 Winter Olympics were hit by a targeted cyber attack. Ransomware attacks have become commonplace. Cyber risk directly correlates to business risk. And cyber disasters strike more frequently with broader impact than their physical counterparts. Thus, modern DR strategies must prioritize cyber scenarios.
Takeaways
Sean Deuby brings 30 years’ experience in Enterprise IT and Hybrid Identity to his role as Director of Services at Semperis. An original architect and technical leader of Intel Active Directory, Texas Instrument’s Windows NT network, and 15-time MVP alumnus, Sean has been involved with Microsoft identity technology since its inception. His experience as an identity strategy consultant for many Fortune 500 companies gives him a broad perspective on the challenges of today’s identity-centered security. Sean is also an industry journalism veteran; as former technical director for Windows IT Pro, he has over 400 published articles on Active Directory, Azure Active Directory and related security, and Windows Server. He has presented sessions at multiple CIS / Identiverse conferences.
Topic: Account Takeover: 15 billion credentials exposed In our latest account takeover (ATO) findings, we have observed a significant increase in credentials listed on the deep and dark web (15 billion and counting), tools that enable account takeover, and account takeover service advertisements on criminal marketplaces. This presentation highlights the sheer volume of account takeover, how ATO can impact your organization, and mitigation recommendations to keep your credentials safe.
By attending this session, you will take away:
About the Speaker: Alec Alvarado, Cyber Threat Intelligence
Alec started his intelligence career in 2012 with the US Army as an enlisted all-source intelligence soldier and quickly found a passion for intelligence analysis at Advanced Individual Training (AIT). He graduated from the University of Nevada – Las Vegas in 2016 and became a commissioned Military Intelligence Second Lieutenant in the United States Army Reserve. In 2017, he began his civilian career as a Cyber Intelligence Analyst with Digital Shadows, where he discovered a secondary passion within cyber threat intelligence. This passion led him to develop his knowledge of the threat landscape and acquire base knowledge of cyber-related threats. His most recent position at Digital Shadows is as a Cyber Threat Intelligence Team Lead and in Aug 2020 he began pursuit of a Masters in Science and Technology intelligence at the National Intelligence University.
Virtual CyberEscape Room by Living Security > Whether you are looking to engage your employees in cybersecurity awareness training through in-person experiences, enhance your online training with gamification, or both, Living Security works closely with clients to build out the best security focused security education and training for the enterprise. Living Security’s CyberEscape room helps organizations reduce risk through engaging, impactful, customized, and human-focused experiences by providing and facilitating an in-person CyberEscape room training. Trailer
In partnership with ISSA New England, attendees will be split into teams of 8 and a Living Security Moderator will lead each group for the exercise. The teams will compete to be the first to escape the cybersecurity themed room. The task will involve tracking down the insider threat using provided clues to thwart the attack before it's too late!
The winning team each gets a $25 gift card from ISSA New England.
Privacy statement from Living Security:
Living Security takes privacy seriously. We collect your contact information for our internal records to track your experience with our products, and will never sell or distribute your information without your consent. By choosing to register you confirm that we can store your email address and contact you with product and service information.
Best Practices for an Optimal Experience:
Attend the Fall Threat Summit with ISSA New England. Exciting presentations from Digital Shadows and Semperis. Participate in the Virtual Cyberescape room (Trailer) hosted by Living Security for a chance to win $Gift card$. Attendees will get 3 CPEs.
Date and Time – Sept. 24, 2020, 4 pm - 7 pm EST
Agenda:
4:00 – 4:45 pm Ransomware Risk and Recovery by Sean Deuby, Director of Services at Semperis
4:45 – 5:30 pm Account Takeover: Magnitude and Impact by Alec Alvarado, Cyber Threat Intelligence, Digital Shadows
5:30 – 7:00 pm CyberEscape Room with Living Security and Winning Prize!!!
Register in advance for this meeting: [registration button at bottom of this page]
Topic : Ransomware, Risk, and Recovery: Is Your DR Strategy Ready for Today’s Threats? Disaster Recovery (DR) strategies have traditionally focused on natural disasters, then expanded into other physical events such as terrorism. Today, cyber weaponization is everywhere, and the "extinction event" is a genuine threat with no respect for geographic boundaries.
In 2017 the NotPetya ransomware attack impacted Maersk worldwide in under 10 minutes and cost the company over $300M. The 2018 Winter Olympics were hit by a targeted cyber attack. Ransomware attacks have become commonplace. Cyber risk directly correlates to business risk. And cyber disasters strike more frequently with broader impact than their physical counterparts. Thus, modern DR strategies must prioritize cyber scenarios.
Takeaways
- Denial-of-availability malware is now the #1 risk to business operations
- Cyber insurance policies are not the magic bullet they position themselves to be
- New “cyber-first” DR technologies automate recovery of complex systems, facilitate recovery to the cloud, and eliminate the risk of reinfection from system state and bare-metal backups
Sean Deuby brings 30 years’ experience in Enterprise IT and Hybrid Identity to his role as Director of Services at Semperis. An original architect and technical leader of Intel Active Directory, Texas Instrument’s Windows NT network, and 15-time MVP alumnus, Sean has been involved with Microsoft identity technology since its inception. His experience as an identity strategy consultant for many Fortune 500 companies gives him a broad perspective on the challenges of today’s identity-centered security. Sean is also an industry journalism veteran; as former technical director for Windows IT Pro, he has over 400 published articles on Active Directory, Azure Active Directory and related security, and Windows Server. He has presented sessions at multiple CIS / Identiverse conferences.
Topic: Account Takeover: 15 billion credentials exposed In our latest account takeover (ATO) findings, we have observed a significant increase in credentials listed on the deep and dark web (15 billion and counting), tools that enable account takeover, and account takeover service advertisements on criminal marketplaces. This presentation highlights the sheer volume of account takeover, how ATO can impact your organization, and mitigation recommendations to keep your credentials safe.
By attending this session, you will take away:
- The size of the ATO problem
- Tools that attackers use for conducting ATO
- Current and evolved approaches to brute-forcing
- Best practices for preventing ATO
About the Speaker: Alec Alvarado, Cyber Threat Intelligence
Alec started his intelligence career in 2012 with the US Army as an enlisted all-source intelligence soldier and quickly found a passion for intelligence analysis at Advanced Individual Training (AIT). He graduated from the University of Nevada – Las Vegas in 2016 and became a commissioned Military Intelligence Second Lieutenant in the United States Army Reserve. In 2017, he began his civilian career as a Cyber Intelligence Analyst with Digital Shadows, where he discovered a secondary passion within cyber threat intelligence. This passion led him to develop his knowledge of the threat landscape and acquire base knowledge of cyber-related threats. His most recent position at Digital Shadows is as a Cyber Threat Intelligence Team Lead and in Aug 2020 he began pursuit of a Masters in Science and Technology intelligence at the National Intelligence University.
Virtual CyberEscape Room by Living Security > Whether you are looking to engage your employees in cybersecurity awareness training through in-person experiences, enhance your online training with gamification, or both, Living Security works closely with clients to build out the best security focused security education and training for the enterprise. Living Security’s CyberEscape room helps organizations reduce risk through engaging, impactful, customized, and human-focused experiences by providing and facilitating an in-person CyberEscape room training. Trailer
In partnership with ISSA New England, attendees will be split into teams of 8 and a Living Security Moderator will lead each group for the exercise. The teams will compete to be the first to escape the cybersecurity themed room. The task will involve tracking down the insider threat using provided clues to thwart the attack before it's too late!
The winning team each gets a $25 gift card from ISSA New England.
Privacy statement from Living Security:
Living Security takes privacy seriously. We collect your contact information for our internal records to track your experience with our products, and will never sell or distribute your information without your consent. By choosing to register you confirm that we can store your email address and contact you with product and service information.
Best Practices for an Optimal Experience:
- Use the latest version of Zoom, find help on support site.
- Use a Laptop or Desktop. Mobile apps are not advised since there will be screen sharing.
- Turn on your webcam and smile! This helps to create a more collaborative environment!
- Chrome is the preferred browser to use.
- Close all other web browser tabs and anything else on display, again there will be screen sharing.
- Get ready to have FUN!